Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

Snyk Log4Shell Stranger Danger Live Hack

In this recorded session, we present a live hack webinar on the Log4Shell exploit. We give a brief overview of the vulnerability and dive right into some examples of the exploit in action. We then show several real-world remediation approaches as well as other fixes outside code. We give a final round of fun demos, including container and IaC hacks as well as Java-based game hacks. We wrap up with a great list of takeaway resources and answer your questions.

6 Common Hacking Techniques and How to Avoid Them

According to the recent Verizon Data Breach Investigations report, 45% of breaches featured hacking in 2020. With high-value information such as user credentials and credit card information being stored on personal devices and transmitted freely online, hacking techniques have evolved to become more sophisticated than ever before.

What to do if your Computer has been Hacked? How to fix it?

It might be hard to believe that your computer can be hacked, you might have heard people saying I have been hacked and it is a serious threat. People have stored a large number of files containing personal information or sensitive data on their computers and attackers are always looking for ways to get access to them. You may be one of those people who claim, that they have been hacked, but they have no idea what to do next or how to repair the breach.

How can you Prevent Hacking? Tips to Protect Your Devices

With the rise in hacking and cyber-attacks, it is more important than ever to learn how to prevent hacking of your devices. No one wants their sensitive information or financial data get breached or their identities have taken over by a hacker. In this article, we will discuss tips and techniques for preventing hacking on your computer so you can be safe online.

Debunked: Is a subdomain takeover 'game over' for companies?

When was the last time you checked DNS configurations for subdomains pointing at services not in use? According to Crowdsource ethical hacker Thomas Chauchefoin, while expired and forgotten subdomains can easily become an entrypoint for an attacker to steal sensitive data, a robust attack surface management programme in place can keep them at bay.